Analytical model for authentication transmission overhead between entities in mobile networks

9Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile networks. In this research the current authentication protocol has been enhanced by reducing the network traffic, signalling message between entities. Consequently the bottleneck at authentication centre is avoided. This is achieved by reducing the number of messages between mobile and authentication centre, then reducing the authentication times, and setup time as well as improving authentication efficiency as shown in analytical analysis and simulation results. In this paper dynamic length (L) for an array for authentication vector (AV) has been proposed. This requires designing a new technique to predict the numbers of records in AV in each authentication data request depending on the arrival rate of authentication events and residence time of the mobile station (MS) in VLR/SGSN. The analytical and simulation study have been carried out to explore the impact of dynamic length for authentication vector on the signalling traffic in mobile network. To validate the simulation results in this research work, the results have been compared with the analytical results and fill match has been achieved. © 2007 Elsevier B.V. All rights reserved.

Cite

CITATION STYLE

APA

Al-Saraireh, J., & Yousef, S. (2007). Analytical model for authentication transmission overhead between entities in mobile networks. Computer Communications, 30(8), 1713–1720. https://doi.org/10.1016/j.comcom.2007.02.001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free